We take a look at a Facebook hoax which uses supposedly injured dogs as the lure for a bait and…
The ransomware attack was discovered on April 12th, 2023 when the company began investigating an issue in its Aloha restaurant…
Using a false call to deploy emergency services to the address of a victim or a school has been turned…
In my last blog, I examined why cybercrime increases during economic hardship and why innovation and vigilance are necessary to…
With plans to offer more ransomware, LockBit has just created a variant for macOS. But, as experts have pointed out,…
TL/DR: Just as vulnerabilities are constantly evolving, so must your approach to external attack surface monitoring. In addition to our…
Created/Updated: April 18, 2023 This is harder than it should be. Way harder. 0. Enable your terminal to make changes…
Within the Linux kernel, a security flaw that has been given the identifier CVE-2023-2002 has been discovered; this flaw poses…
How a simple scheduled job can help you quickly recover from ransomware. It’s 2019, and ransomware has become a thing….
This blog post is part 1 of an ongoing series that provide deep dives into HackerOne Assets and its core…
Numerous vulnerabilities have been found this week in Spring, a popular Java Web app development framework from VMware. Detectify Surface…
The US, UK, and Cisco are warning of Russian state-sponsored APT28 hackers deploying a custom malware named ‘Jaguar Tooth’ on…